The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Post
by
Vikash
Abraham,
Product
Marketing
Manager
for
IBM
Security
Solutions
What
Zen,
Ancient
Wisdom
and
Infrastructure
Security
Have
in
Common
Ancient
wisdom
continues
to
amaze
me,
and
this
struck
me:
Isn’t
there
a
strong
correlation
between
ancient
philosophies
and
infrastructure
security?
This
blog
post
does
not
look
at
measuring
the
superiority
... [ + Read more ]

Wow,
the
end
of
a
great
first
day
at
Infosecurity
Europe.
Our
stand
was
very
bright
and
impactful
and
with
our
industry
experts,
business
partners
and
action
packed
agenda,
it
has
been
truly
engaging
day!
We
had
four
workshops
across
the
day
and
below
are
the
key
points
that
I
thought
... [ + Read more ]

IBM
Security
Systems
had
another
great
day
at
Infosecurity
Europe,
with
good
attendance
at
our
stand
for
the
hourly
interactive
graffiti
whiteboarding
sessions,
which
covered
all
the
hottest
security
topics.
In
our
workshops
we
had
four
successful
sessions,
allowing
attendees
insights
into
Security
Intelligence,
Mobile
and
Future
thinking.
Here
are
my
... [ + Read more ]

As
the
third
day
came
to
a
close
on
Infosecurity
Europe
and
our
stand
is
now
slowly
being
taken
down,
I
wanted
to
provide
some
key
highlights
of
the
whiteboarding
sessions
that
happened
live
on
our
interactive
graffiti
wall.
How
to
Protect
your
Crown
Jewels
First
up
was
David
Gray
from
our
... [ + Read more ]

NEW!
IBM
X-Force
2012
Annual
Trend
and
Risk
ReportTwice
a
year
since
the
late
1990s,
IBM’s
X-Force
Research
and
Development
team
releases
a
trend
and
risk
report
including
content
collected
from
dozens
of
thought
leaders
across
the
company.
Its
findings,
analyses
and
predictions
come
from
working
with
our
thousands
of
... [ + Read more ]

This
post
is
an
excerpt
from
the
IBM
Mainframe
Insights
blog
found
at
http://ibm.co/SystemZBlog
and
was
written
by
Tom
Turner,
VP
of
Marketing
for
IBM
Security.
Read
the
full
post
here: http://ibm.co/Tb4Ibl.
"The
mainframe
has
a
rich
and
proven
legacy
of
providing
an
industrial
strength
combination
of
hardware
and
software
security
functions
... [ + Read more ]

You
may
have
‘Big
Data’
and
not
know
it…
can
you
protect
it?
To
many
security
executives
the
word
“Big
Data”
seems
to
being
something
that
someone
else
has
and
thus
not
applicable
to
ones
own
enterprise.
Many
Security
managers
assume
that
their
own
data-center
is
traditional
and
that
... [ + Read more ]